More on the Obama text-message campaign:
[A]nnouncing Mr. Obama's running mate by text message has little to do with proclaiming the selection and everything to do with getting out the vote on Election Da....

Last year I reported that mobile technology was "notable for its absence" in next-gen political campaigns.
"It should be maybe the most important technology of 2008, but it isn't," said Republican consulta....

With Georgia "cyberlocked" by Russian attacks on its net infrastructure, sympathetic countries and companies are helping out.
Estonia, the victim of what may have been the world's first state-sponsored c....

The bust of an international credit-card fraud ring makes the world a marginally safer place to do business -- but also reveals the scope of the challenges you face in trying to keep your data safe.
NYT:....

"The Georgian embassy in the U.K. has accused forces within Russia of launching a coordinated cyberattack against Georgian Web sites, to coincide with military operations in the breakaway region of South O....

Not since the Terminator got crunched by that machine press has Arnold Schwarzenegger been so abused by retro-technology.
Schwarzenegger wants to slash the pay of state workers in California, but it's rea....

Cloud computing is gaining steam, but is it helping businesses save money? Our talented contributor Tony Kontzer penned a solid look at the next stage of cloud computing.
The cloud appears to have numer....

Gartner's Hype Cycle report lists technologies and trends that are moving through Bunyanesque stages (e.g., "Trough of Disillusionment," "Slope of Enlightenment").
The idea is that we get all excited about....

You may not have time to wade through the meandering verbiage in this article about data-center costs by Kenneth G. Brill. That's why we're here.
The gist: data center costs often are poorly understood an....

Security is quite the hot topic around here this week, and here's one more: a company called Zscaler is offering cloud-based internet security services.
More here: [T]he cloud-based service, which is ren....

A striking example of the limits of computer security, filed by Ben Worthen at the Black Hat conference:
Within minutes of arriving on Wednesday we were warned not to use the hotel's wireless Internet netw....

Apple's got a tight rein on the iPhone App Store -- and your iPhone. "Note that this is very different from just removing an application from the App Store. In case of this black listing, Apple could presu....